logo

ASSIGNMENT WHAT IS CYBER CRIME ?

Write an investigative report on the methods used by alleged state-sanctioned cyber-criminals to attack another country's banking and finance industry. Provide a Courses of Action report to an imagined Executive Board at a bank to prepare for a large-scale attack that might also include supporting Critical National Infrastructure. Advocate for business security prevention measures and business resilience measures to be implemented over the next 12 months.

8 Pages1982 Words28 Views
   

Added on  2022-09-12

ASSIGNMENT WHAT IS CYBER CRIME ?

Write an investigative report on the methods used by alleged state-sanctioned cyber-criminals to attack another country's banking and finance industry. Provide a Courses of Action report to an imagined Executive Board at a bank to prepare for a large-scale attack that might also include supporting Critical National Infrastructure. Advocate for business security prevention measures and business resilience measures to be implemented over the next 12 months.

   Added on 2022-09-12

ShareRelated Documents
Running head: CYBER CRIME
CYBERCRIME
Name of the student
Name of the university
Author note
ASSIGNMENT WHAT IS CYBER CRIME ?_1
CYBER CRIME1
Introduction
The contemporary growth and development of cyber-technology and networking are
significant in that emerge the issue of cyber-crime. Although the growth of technology has
increased the security measures, the same is, unfortunately, has also accepted the attackers with
the supplementary mechanism to “break-in.” The attackers apply networks that are different in
nature as well as their existing manner of security, no matter how hard it is, are not sufficient to
keep out of violation. In such circumstances, the organization and entity come in the firing area,
and the attacks perform as the gateway that leads to the eventual destruction. Cybercrime is also
designated as non-money crimes such as spreading and developing viruses on other schemes and
thus posting private data on social media.
Methods of cybercrime
The crime that is either facilitated or committed through the internet is termed as
cybercrime. It is an illegal activity that engages networks and computers. Cybercrime deception
can be series from illegal emails to stealing of the company’s sensitive information or
government data by remote machines all around the world. The offense of cybercrime facilitates
a diverse category of danger to the institution (Banks, 2017). For example, cybercrime is diverse
from that of tangibly theft money from the banking or financial institution. In the offense of
cybercrime, the deception is started from the internet in addition to that has a distant association
with the system of financial institutions.
The methods that are implicated for cyber-crime involves data breach. A data breach is
an event where the data is taken or stolen from the system without the authorization or
ASSIGNMENT WHAT IS CYBER CRIME ?_2
CYBER CRIME2
knowledge of the owner of the system. Stolen information involves proprietary, sensitive, or
private data such as the number of credit cards, customer information, trade matter, or secrets of
national security. The method of computer hacking is intruding and modifying software or
hardware that si nor comprehended originally by the inventor. Hackers are the person who
indulges in the programming shills as well as proficiency in dealing with the entire structure.
Botnets are the method of malware that cyber hackers engage in regulating the infected
structure. Networks are connected and cooperated under the singer hacker that is termed as a
botnet. The virus is malware that extents by insertion of its copy to become a central part of
another programming (Lindsay & Gartzke, 2016).. It transmits from one structure to another,
leaving back infection. Worms also create the same damage. They duplicate the serviceable
copies of themselves and thus infect the arrangement.
Ransomware is the major threat that is widespread stretching from the national to the
social terrains. It aims the domestic business, users as well as government networks that inclined
to the permanent or temporary as of the sensitive data. They can become the foundation of
disturbance of services or economic loss that engaged in files restoration in addition to that
tarnishing the reputation of the organization. Phishing is the illegal act that implicates technical
subterfuge and social engineering to theft the details of the personal identity of the consumer as
well as the financial credential. The schemes of social engineering are spoofed emails that
deceive the recipients from the information as passwords and usernames.
Cyberbullying is implicated by employing electronic technology through machines like
computers, cellphones, tablets, and also with the tools of communication such as sites of social
media and websites termed as cyberbullying (Charlton, 2015). This method of cyber threats is
mainly revealed from the legal sites that are hacked by the gatecrashers to generate vulnerability.
ASSIGNMENT WHAT IS CYBER CRIME ?_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87

Cyber Crime and the Role of Hackers in Russia
|13
|3237
|475

Method to Detect and Mitigate Data
|13
|2575
|61

Assignment on Trends in Cybercrime
|13
|3063
|21

Recent Cybercrimes: UniCredit Bank and British Airways Data Breach
|42
|11271
|487

Cybercrime: Motivations, Consequences, and Current Defence
|9
|3137
|159